layout | parent | title |
---|---|---|
page |
Custom resources overview |
ArangoDeploymentReplication |
Full CustomResourceDefinition reference ->
The ArangoDB Replication Operator creates and maintains ArangoDB
arangosync
configurations in a Kubernetes cluster, given a replication specification.
This replication specification is a CustomResource
following
a CustomResourceDefinition
created by the operator.
Example of a minimal replication definition for two ArangoDB clusters with sync in the same Kubernetes cluster:
apiVersion: "replication.database.arangodb.com/v1"
kind: "ArangoDeploymentReplication"
metadata:
name: "replication-from-a-to-b"
spec:
source:
deploymentName: cluster-a
auth:
keyfileSecretName: cluster-a-sync-auth
destination:
deploymentName: cluster-b
This definition results in:
- the arangosync
SyncMaster
in deploymentcluster-b
is called to configure a synchronization from the syncmasters incluster-a
to the syncmasters incluster-b
, using the client authentication certificate stored inSecret
cluster-a-sync-auth
. To accesscluster-a
, the JWT secret found in the deployment ofcluster-a
is used. To accesscluster-b
, the JWT secret found in the deployment ofcluster-b
is used.
Example replication definition for replicating from a source that is outside the current Kubernetes cluster to a destination that is in the same Kubernetes cluster:
apiVersion: "replication.database.arangodb.com/v1"
kind: "ArangoDeploymentReplication"
metadata:
name: "replication-from-a-to-b"
spec:
source:
masterEndpoint: ["https://163.172.149.229:31888", "https://51.15.225.110:31888", "https://51.15.229.133:31888"]
auth:
keyfileSecretName: cluster-a-sync-auth
tls:
caSecretName: cluster-a-sync-ca
destination:
deploymentName: cluster-b
This definition results in:
- the arangosync
SyncMaster
in deploymentcluster-b
is called to configure a synchronization from the syncmasters located at the given list of endpoint URLs to the syncmasterscluster-b
, using the client authentication certificate stored inSecret
cluster-a-sync-auth
. To accesscluster-a
, the keyfile (containing a client authentication certificate) is used. To accesscluster-b
, the JWT secret found in the deployment ofcluster-b
is used.
The requirements for setting up Datacenter-to-Datacenter (DC2DC) Replication are:
- You need to have two ArangoDB clusters running in two different Kubernetes clusters.
- Both Kubernetes clusters are equipped with support for
Services
of typeLoadBalancer
. - You can create (global) DNS names for configured
Services
with low propagation times. E.g. use Cloudflare. - You have 4 DNS names available:
- One for the database in the source ArangoDB cluster, e.g.
src-db.mycompany.com
- One for the ArangoDB syncmasters in the source ArangoDB cluster, e.g.
src-sync.mycompany.com
- One for the database in the destination ArangoDB cluster, e.g.
dst-db.mycompany.com
- One for the ArangoDB syncmasters in the destination ArangoDB cluster, e.g.
dst-sync.mycompany.com
- One for the database in the source ArangoDB cluster, e.g.
Follow these steps to configure DC2DC replication between two ArangoDB clusters running in Kubernetes:
-
Enable DC2DC Replication support on the source ArangoDB cluster.
Set your current Kubernetes context to the Kubernetes source cluster.
Edit the
ArangoDeployment
of the source ArangoDB clusters:- Set
spec.tls.altNames
to["src-db.mycompany.com"]
(can include more names / IP addresses) - Set
spec.sync.enabled
totrue
- Set
spec.sync.externalAccess.masterEndpoint
to["https://src-sync.mycompany.com:8629"]
- Set
spec.sync.externalAccess.accessPackageSecretNames
to["src-accesspackage"]
- Set
-
Extract the access package from the source ArangoDB cluster.
kubectl get secret src-accesspackage --template='{{index .data "accessPackage.yaml"}}' | \ base64 -D > accessPackage.yaml
-
Configure the source DNS names.
kubectl get service
Find the IP address contained in the
LoadBalancer
column for the followingServices
:<deployment-name>-ea
Use this IP address for thesrc-db.mycompany.com
DNS name.<deployment-name>-sync
Use this IP address for thesrc-sync.mycompany.com
DNS name.
The process for configuring DNS names is specific to each DNS provider.
Set your current Kubernetes context to the Kubernetes destination cluster.
Edit the
ArangoDeployment
of the source ArangoDB clusters:- Set
spec.tls.altNames
to["dst-db.mycompany.com"]
(can include more names / IP addresses) - Set
spec.sync.enabled
totrue
- Set
spec.sync.externalAccess.masterEndpoint
to["https://dst-sync.mycompany.com:8629"]
-
Enable DC2DC Replication support on the destination ArangoDB cluster.
-
Import the access package in the destination cluster.
kubectl apply -f accessPackage.yaml
Note: This imports two
Secrets
, containing TLS information about the source cluster, into the destination cluster. -
Configure the destination DNS names.
kubectl get service
Find the IP address contained in the
LoadBalancer
column for the followingServices
:<deployment-name>-ea
Use this IP address for thedst-db.mycompany.com
DNS name.<deployment-name>-sync
Use this IP address for thedst-sync.mycompany.com
DNS name.
The process for configuring DNS names is specific to each DNS provider.
-
Create an
ArangoDeploymentReplication
resource.Create a yaml file (e.g. called
src-to-dst-repl.yaml
) with the following content:apiVersion: "replication.database.arangodb.com/v1" kind: "ArangoDeploymentReplication" metadata: name: "replication-src-to-dst" spec: source: masterEndpoint: ["https://src-sync.mycompany.com:8629"] auth: keyfileSecretName: src-accesspackage-auth tls: caSecretName: src-accesspackage-ca destination: deploymentName: <dst-deployment-name>
-
Wait for the DNS names to propagate.
Wait until the DNS names configured in step 3 and 6 resolve to their configured IP addresses.
Depending on your DNS provides this can take a few minutes up to 24 hours.
-
Activate the replication.
kubectl apply -f src-to-dst-repl.yaml
Replication from the source cluster to the destination cluster will now be configured.
Check the status of the replication by inspecting the status of the
ArangoDeploymentReplication
resource using:kubectl describe ArangoDeploymentReplication replication-src-to-dst
As soon as the replication is configured, the
Add collection
button in theCollections
page of the web interface (of the destination cluster) will be grayed out.
The authentication settings in a ArangoDeploymentReplication
resource are used for two distinct purposes.
The first use is the authentication of the syncmasters at the destination with the syncmasters at the source.
This is always done using a client authentication certificate which is found in a tls.keyfile
field
in a secret identified by spec.source.auth.keyfileSecretName
.
The second use is the authentication of the ArangoDB Replication operator with the syncmasters at the source
or destination. These connections are made to configure synchronization, stop configuration and fetch the status
of the configuration.
The method used for this authentication is derived as follows (where X
is either source
or destination
):
- If
spec.X.userSecretName
is set, the username + password found in theSecret
identified by this name is used. - If
spec.X.keyfileSecretName
is set, the client authentication certificate (keyfile) found in theSecret
identifier by this name is used. - If
spec.X.deploymentName
is set, the JWT secret found in the deployment is used.
The client authentication certificates needed for the Secrets
identified by spec.source.auth.keyfileSecretName
& spec.destination.auth.keyfileSecretName
are normal ArangoDB keyfiles that can be created by the arangosync create client-auth keyfile
command.
In order to do so, you must have access to the client authentication CA of the source/destination.
If the client authentication CA at the source/destination also contains a private key (ca.key
), the ArangoDeployment operator
can be used to create such a keyfile for you, without the need to have arangosync
installed locally.
Read the following paragraphs for instructions on how to do that.
An access package is a YAML file that contains:
- A client authentication certificate, wrapped in a
Secret
in atls.keyfile
data field. - A TLS certificate authority public key, wrapped in a
Secret
in aca.crt
data field.
The format of the access package is such that it can be inserted into a Kubernetes cluster using the standard kubectl
tool.
To create an access package that can be used to authenticate with the ArangoDB SyncMasters of an ArangoDeployment
,
add a name of a non-existing Secret
to the spec.sync.externalAccess.accessPackageSecretNames
field of the ArangoDeployment
.
In response, a Secret
is created in that Kubernetes cluster, with the given name, that contains a accessPackage.yaml
data field
that contains a Kubernetes resource specification that can be inserted into the other Kubernetes cluster.
The process for creating and using an access package for authentication at the source cluster is as follows:
- Edit the
ArangoDeployment
resource of the source cluster, setspec.sync.externalAccess.accessPackageSecretNames
to["my-access-package"]
- Wait for the
ArangoDeployment
operator to create aSecret
namedmy-access-package
. - Extract the access package from the Kubernetes source cluster using:
kubectl get secret my-access-package --template='{{index .data "accessPackage.yaml"}}' | base64 -D > accessPackage.yaml
- Insert the secrets found in the access package in the Kubernetes destination cluster using:
kubectl apply -f accessPackage.yaml
As a result, the destination Kubernetes cluster will have 2 additional Secrets
. One contains a client authentication certificate
formatted as a keyfile. Another contains the public key of the TLS CA certificate of the source cluster.